#1
|
||||
|
||||
x86 Code Virtualizer (Code Obfuscator)
Today I am going to make one of my old projects publicly available for those who are interested to use it, the project is related to binary level obfuscation using virtual machine technology.
What I share for you : Open-source and lite application to obfuscate binary codes and makes challenge for reverse engineers to understand code. Features : Protect and obfuscate sensitive area of code using virtual machine protection ( translation of byte-code to PCode and run them inside Virtual Machine ) Project has been writen in Microsoft VC++ & little pure asm code and uses BeaEngine as disassembler engine. It's not enough secure to use in commercial projects so try to learn how it works and make it better. Supported x86 opcodes : Code:
Mov,Call,Push,Pop,Jump,Inc,Add,Xor,Cmp,Shl,Shr,Not,Or,Sub,Conditional Jumps. Code:
https://github.com/NIKJOO/x86-Code-Virtualizer Last edited by Gladiyator; 09-03-2020 at 09:18. |
The Following 3 Users Gave Reputation+1 to Gladiyator For This Useful Post: | ||
The Following 12 Users Say Thank You to Gladiyator For This Useful Post: | ||
an0rma1 (09-03-2020), h8er (09-30-2020), Mahmoudnia (09-03-2020), MarcElBichon (09-03-2020), Matan (09-08-2020), MrScotc (09-04-2020), phroyt (09-03-2020), SinaDiR (09-03-2020), Top10 (09-06-2020), uel888 (09-03-2020), WaSt3d_ByTes (09-08-2020), wilson bibe (09-04-2020) |
#2
|
|||
|
|||
Seems to me a good tool to prevent reversing of some parts of the code where you make a patch, you have forecast to include X64 opcodes in your tool? It would be interesting to insert in the obfuscated code a text like this for example "cracked by....." this is only an idea.
Greetings |
The Following User Says Thank You to wilson bibe For This Useful Post: | ||
Gladiyator (09-04-2020) |
Tags |
exe, obfuscator, protector, source code, virtualizer |
Thread Tools | |
Display Modes | |
|
|